You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<1> synonymous with the previous lambda expression
79
+
<1> use a lambda expression or `CertificateValidations.AllowAll` to allow all validation
80
80
81
81
===== Allowing certificates from a Certificate Authority
82
82
83
83
If your client application has access to the public CA certificate locally, Elasticsearch.NET and NEST ship with some handy helpers
84
84
that can assert that a certificate the server presents is one that came from the local CA.
85
85
86
-
If you use X-Pack's {ref_current}/certutil.html[`elasticsearch-certutil` tool] to generate SSL certificates, the generated node certificate
86
+
If you use {ref_current}/certutil.html[`elasticsearch-certutil` tool] to generate SSL certificates, the generated node certificate
87
87
does not include the CA in the certificate chain, in order to cut down on SSL handshake size. In those case you can use
88
88
`CertificateValidations.AuthorityIsRoot` and pass it your local copy of the CA public key to assert that
89
89
the certificate the server presented was generated using it
@@ -120,60 +120,3 @@ If you go for a vendor generated SSL certificate, it's common practice for the c
120
120
in the certificate chain. When using such a certificate, use `CertificateValidations.AuthorityPartOfChain` which validates that
121
121
the local CA certificate is part of the chain that was used to generate the servers key.
122
122
123
-
==== Client Certificates
124
-
125
-
X-Pack also allows you to configure a {ref_current}/configuring-pki-realm.html[PKI realm] to enable user authentication
126
-
through client certificates. The {ref_current}/certutil.html[`elasticsearch-certutil` tool] included with X-Pack allows you to
127
-
generate client certificates as well and assign the distinguished name (DN) of the
128
-
certificate to a user with a certain role.
129
-
130
-
By default, the `elasticsearch-certutil` tool only generates a public certificate (`.cer`) and a private key `.key`. To authenticate with client certificates, you need to present both
131
-
as one certificate. The easiest way to do this is to generate a `pfx` or `p12` file from the `.cer` and `.key`
132
-
and attach these to requests using `new X509Certificate(pathToPfx)`.
133
-
134
-
You can pass a client certificate on `ConnectionSettings` for *all* requests.
135
-
136
-
[source,csharp]
137
-
----
138
-
public class PkiCluster : CertgenCaCluster
139
-
{
140
-
public PkiCluster() : base(new SslAndKpiClusterConfiguration
0 commit comments